As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Online banking provides great conveniences to end users and its usage is increasing daily. Fraudsters are constantly developing new attacks for this service, so the security of this sensitive information it provides access to is constantly being put to the test. Brazil is often the testing ground for new fraudster...
Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
Part 1 - Voice Biometrics in the Call Center
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process...
Payment card fraud remains a top challenge for financial institutions. The latest wrinkle: Breached retailers such as Target and Home Depot, whose compromises led to wholesale card fraud. Card issuers absorb increasing losses linked to debit and credit fraud, yet they have little control over the third-party points of...
This session provides a detailed review of BankInfoSecurity's "Faces of Fraud" survey focused on the European market. Receive insights and expert analysis on topics such as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of the new Canadian legislation are...
Session Preview:
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do...
Security experts are advising Google users to change their passwords in the wake of almost 5 million usernames and passwords surfacing on Russian cybercrime forums. But some of the stolen data may be several years old.
We'll start the 2014 Fraud Summit Toronto with a detailed review of BankInfoSecurity's latest "Faces of Fraud" survey, focused on the Canadian market. Receive insights and expert analysis on such topics as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of...
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Information Security Media Group recently hosted a Twitter chat on the latest fraud trends featuring analyst Avivah Litan, director of research at Gartner, Read the entire transcript of the #ISMGprotalk Twitter chat.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
A new impersonation scheme is taking aim at business executives to perpetuate ACH and wire fraud, says Bank of the West's David Pollino, who explains steps institutions should take now to protect their customers.
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.